Show filters
158 Total Results
Displaying 61-70 of 158
Sort by:
Attacker Value
Unknown

CVE-2020-25677

Disclosure Date: December 08, 2020 (last updated February 22, 2025)
A flaw was found in Ceph-ansible v4.0.41 where it creates an /etc/ceph/iscsi-gateway.conf with insecure default permissions. This flaw allows any user on the system to read sensitive information within this file. The highest threat from this vulnerability is to confidentiality.
Attacker Value
Unknown

CVE-2020-2310

Disclosure Date: November 04, 2020 (last updated October 26, 2023)
Missing permission checks in Jenkins Ansible Plugin 1.0 and earlier allow attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
Attacker Value
Unknown

CVE-2020-25635

Disclosure Date: October 05, 2020 (last updated February 22, 2025)
A flaw was found in Ansible Base when using the aws_ssm connection plugin as garbage collector is not happening after playbook run is completed. Files would remain in the bucket exposing the data. This issue affects directly data confidentiality.
Attacker Value
Unknown

CVE-2020-25636

Disclosure Date: October 05, 2020 (last updated February 22, 2025)
A flaw was found in Ansible Base when using the aws_ssm connection plugin as there is no namespace separation for file transfers. Files are written directly to the root bucket, making possible to have collisions when running multiple ansible processes. This issue affects mainly the service availability.
Attacker Value
Unknown

CVE-2020-14365

Disclosure Date: September 23, 2020 (last updated February 22, 2025)
A flaw was found in the Ansible Engine, in ansible-engine 2.8.x before 2.8.15 and ansible-engine 2.9.x before 2.9.13, when installing packages using the dnf module. GPG signatures are ignored during installation even when disable_gpg_check is set to False, which is the default behavior. This flaw leads to malicious packages being installed on the system and arbitrary code executed via package installation scripts. The highest threat from this vulnerability is to integrity and system availability.
Attacker Value
Unknown

CVE-2020-14332

Disclosure Date: September 11, 2020 (last updated February 22, 2025)
A flaw was found in the Ansible Engine when using module_args. Tasks executed with check mode (--check-mode) do not properly neutralize sensitive data exposed in the event data. This flaw allows unauthorized users to read this data. The highest threat from this vulnerability is to confidentiality.
Attacker Value
Unknown

CVE-2020-14330

Disclosure Date: September 11, 2020 (last updated February 22, 2025)
An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest threat from this vulnerability is to data confidentiality.
Attacker Value
Unknown

CVE-2019-14904

Disclosure Date: August 26, 2020 (last updated February 22, 2025)
A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the 'ps' bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the remote host. Ansible Engine 2.7.15, 2.8.7, and 2.9.2 as well as previous versions are affected.
Attacker Value
Unknown

CVE-2020-14337

Disclosure Date: July 31, 2020 (last updated February 21, 2025)
A data exposure flaw was found in Tower, where sensitive data was revealed from the HTTP return error codes. This flaw allows an unauthenticated, remote attacker to retrieve pages from the default organization and verify existing usernames. The highest threat from this vulnerability is to data confidentiality.
Attacker Value
Unknown

CVE-2020-10782

Disclosure Date: June 18, 2020 (last updated February 21, 2025)
An exposure of sensitive information flaw was found in Ansible version 3.7.0. Sensitive information, such tokens and other secrets could be readable and exposed from the rsyslog configuration file, which has set the wrong world-readable permissions. The highest threat from this vulnerability is to confidentiality. This is fixed in Ansible version 3.7.1.